Which technology is most often exploited by a hacker to spread from one system to another?
A.
SSL certificates
B.
Buffer overflows
C.
Key-based authentication in SSH
D.
Password-based authentication in SSH
Explanation:
Which technology is most often exploited by a hacker to spread from one system to another?
Which technology is most often exploited by a hacker to spread from one system to another?
A.
SSL certificates
B.
Buffer overflows
C.
Key-based authentication in SSH
D.
Password-based authentication in SSH
Explanation: